2 Page 1 Abstract The Department of Homeland Security (DHS), U.S. Customs and Border Protection (CBP) Office of Information Technology s (OIT) Enterprise Services Management System is a technology services suite that manages: 1) information technology (IT) help desk service requests, 2) maintenance activities, system, and hardware outage support, 3) new IT system testing and evaluations, and 4) technology asset and property tracking. also serves as an intake tool for CBP technical support and customer service personnel supporting non-cbp persons from other Government agencies, state, local and federal law enforcement entities, as well as traderelated organizations requiring access to CBP-owned IT systems. Additionally, allows members of the public to obtain customer service assistance and submit inquiries related to benefit status, traveler redress, travel and port of entry policies, as well as agency programs. CBP is conducting this Privacy Impact Assessment because this system collects personally identifiable information (PII) about members of the public. Overview is a modified suite of commercial-off-the-shelf (COTS) software applications used to manage technical support and other service-oriented activities throughout CBP s technology enterprise. CBP technical support and customer service personnel use to create and track numerical incident tickets to manage: 1) information technology (IT) help desk service requests; 2) maintenance activities, system, and hardware outage support; 3) new IT system testing and evaluations; and 4) technology asset and property tracking. Customer service inquiries may be submitted by three types of individuals: from CBP employees and contractors; non-cbp persons who have access to CBP systems for official business; or members of the public who have voluntarily applied for trusted traveler programs. The types of information that collects vary based on the whether the individual submitting a support request requires access to CBP systems for official business purposes, or if the individual is a trusted traveler trying to access his or her own profile within the Global Online Enrollment System (GOES). Access to CBP IT Systems for Official Business Generally, CBP uses to track and manage CBP internal information technology (IT) and asset management activities, such as: IT Help Desk requests; IT system access requests; Technology incidents involving system or hardware outages;

3 Page 2 Software vulnerabilities and patch management; Hardware distribution and management; New IT system testing and evaluations; IT Technician work order assignments; and Technology asset and property management (including but not limited to laptop and desktop computers, mobiles devices, and/or smartphones). CBP technical support personnel use when they receive a call or to the CBP Help Desk from CBP personnel requesting IT support. CBP converts employee and contractor Social Security numbers (SSN) into CBP identification numbers, also known as a HashID and uses the information to verify identity prior to granting access to certain CBP IT systems or providing technical support. Technical support personnel initiate an incident ticket and request the individual s name, and CBP identification number (HashID) to verify the requestor s identity. Almost all CBP IT systems run on the TECS platform, which is a legacy mainframe and required users to use their SSN for log-in. To deviate from using the SSN as a log-in identifier, CBP instead issues a HashID. All CBP employees and contractors have a HashID, whether or not they require access to TECS. In addition to managing internal IT support requests, CBP technical support and customer service personnel use to manage external requests from non-cbp persons seeking technical support to access various CBP-owned law enforcement, trade, or travel-related IT systems for official business. These systems include the Automated Targeting System (ATS), TECS, Electronic System for Travel Authorization (ESTA), and the Automated Commercial Environment (ACE). 1 To gain access to CBP-owned IT systems (pursuant to their official duties), non-cbp persons that work for other DHS components or local, state, or federal law enforcement entities, must first seek approval through their agency s approving official and the CBP authorizing official for access to the system requested. Following the approval process, non-cbp persons contact the CBP Technical Service Desk and present their full name and Social Security number (SSN) verbally to technical support personnel who converts the SSN through CBP s mainframe IT system (TECS) into a HashID that the individual uses to access the requested system. CBP does not retain the individual s SSN in but stores it in the Mainframe IT system to facilitate access for individuals that cannot recall their HashID. Trusted Traveler Assistance CBP technical support and customer service personnel also use as a workflow management tool to assist members of the public seeking eligibility information or application 1 See:

4 Page 3 status updates on various CBP trusted traveler programs 2 or seeking access to the associated trusted traveler system(s) for which they have applied or been accepted. These individuals do not have access to the CBP trusted traveler systems (beyond access to their own application or profile), but rather are requesting assistance with their specific record or application. CBP also uses to support individuals accessing public-facing websites such as CBP Customer Service (Contact Us) website, 3 CBP Information Center (help.cbp.gov), 4 Global Online Enrollment System (GOES) web portals, 5 and the toll-free CBP Inquiries telephone line. CBP may request contact information in order to direct the individual to the correct point of contact for traveler/border crossing matters, access to CBP IT systems used for law enforcement, trade, or travel purposes, or access to U.S. entry or exit records. CBP does not generate a HashID, nor collect SSN, for any individual who contacts the CBP Help Desk as an individual needing assistance with a trusted traveler program. Section 1.0 Authorities and Other Requirements 1.1 What specific legal authorities and/or agreements permit and define the collection of information by the project in question? CBP may collect and maintain records pursuant to: Homeland Security Act of 2002, as amended, Section U.S. Code Federal agency responsibilities. 7 E-Government Act of 2002, including Title III, Federal Information Security Management Act (FISMA). 8 Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), Section DHS Immigration Regulations on Inspection of Persons Applying for Admission into the Unites States See: 3 See: 4 See: 5 See: 6 See: Pub.L See: 44 U.S.C See: Pub.L See: Pub.L See: 8 CFR Part

5 Page 4 Executive Order 9397 (SSN), as amended by E.O DHS Sensitive Systems Policy Directive 4300A What Privacy Act System of Records Notice(s) (SORN(s)) apply to the information? The SORNs that govern maintenance, use, and dissemination of -related data include: DHS/ALL-004 General Information Technology Access Account Records System of Records Has a system security plan been completed for the information system(s) supporting the project? Yes. CBP completed the System Security Plan for on May 19, A new Authority to Operate (ATO) is pending publication of this PIA. 1.4 Does a records retention schedule approved by the National Archives and Records Administration (NARA) exist? Yes. NARA approved the following retention schedules in September 2015: In accordance with DAA-GRS (IT Operation and Maintenance Records), CBP retains these records for 3 years after the agreement, control measures, procedures, project, activity, or transaction is obsolete, completed, terminated, or superseded. In accordance with DAA-GRS (IT System Development Records), CBP will destroy the records 5 years after the system is superseded by a new iteration, or is terminated, defunded, or no longer needed for agency/it administrative purposes. In accordance with N1-GRS-03-1 item 10b (IT Customer Service Files), CBP will destroy or delete the records after 1 year or when no longer needed for review and analysis. 1.5 If the information is covered by the Paperwork Reduction Act (PRA), provide the OMB Control number and the agency number for the collection. If there are multiple forms, include a list in an appendix. is not covered by the PRA. However, individuals who submit trusted traveler 11 Executive Order (E.O.) 9397, as amended by E.O , 73 FR (November 20, 2008). 12 See: 13 See: DHS/ALL-004 General Information Technology Access Account Records System of Records, 77 FR (November 27, 2012), available at

6 Page 5 applications are provided notice, and OMB reviews the forms at the original point of collection (for example, the online ESTA application). These trusted traveler systems, while supported by, have their own information collection requirements and/or Office of Management and Budget (OMB) control numbers when applicable. Section 2.0 Characterization of the Information 2.1 Identify the information the project collects, uses, disseminates, or maintains. Depending on the individual submitting a request or seeking IT support, CBP collects different information. In addition to IT system, software, or technology-related information, CBP collects the following information from the following individuals: Employees, contractors, and non-cbp persons seeking IT support or access to a CBPowned System for Official Business Purposes: Full name; HashID; SSN (used to convert into a HashID for non-cbp persons who require access to CBP-owned systems for official business purposes); Agency or business entity name; Business location/address; Work or mobile telephone number; address; Business, mobile, or home telephone number (for teleworkers); Login or password information; Name of IT system attempting to access (if applicable); Device name or number; and Ticket number (for existing support requests). Members of the public who seek trusted traveler program assistance: Full name;

7 Page 6 Trusted Traveler identification number; Login or password information (for access to a trusted traveler system); address; Home address; Home or mobile telephone number; and Ticket number (for existing support requests). 2.2 What are the sources of the information and how is the information collected for the project? CBP collects information directly from CBP employees and contractors seeking IT technology support. CBP also collects information directly from non-cbp persons seeking access to CBP-owned law enforcement, trade, or travel-related IT systems for official business. In addition, CBP collects information directly from members of the public requesting information about, or assistance with, CBP trusted-traveler or other agency programs. 2.3 Does the project use information from commercial sources or publicly available data? If so, explain why and how this information is used. No. 2.4 Discuss how accuracy of the data is ensured. Data is collected directly from the CBP employee or contractor, non-cbp persons, or members of the public seeking IT support, system access, or information on CBP trusted-traveler or other programs. Additionally, automates IT help desk accuracy by mapping CBP employees and contractor s HashID to their CBP network active directory to ensure that technical support reaches the assigned technician and the appropriate individual seeking support. 2.5 Privacy Impact Analysis: Related to Characterization of the Information Privacy Risk: CBP does not have clear legal authority to collect SSNs from CBP employees, contractors, and non-cbp personnel in order to generate the HashID number that is used to provide system account access. Mitigation: This risk is not mitigated. There is no existing clear legal authority to collect SSNs from CBP employees, contractors, and non-cbp personnel for the purpose of granting

8 Page 7 account access. The only means by which this risk can be mitigated is for CBP to move away from the use of SSN-derived personnel identifiers (HashID) in order to provide users with access to systems. CBP must develop a centralized, enterprise-level identity management system to replace the HashID. Privacy Risk: There is a risk of over-collection because CBP requires the collection of SSNs to create a system identifier. SSNs are not necessary to provide IT support but are required to assign unique identifiers to non-cbp persons seeking access to CBP-owned IT systems. Mitigation: This risk is partially mitigated. CBP deletes the SSNs from the mainframe system when they are no longer needed to verify identities of non-cbp persons however, this is typically after an individual has not logged into their account for some time. CBP disables the accounts of individuals that fail to access CBP systems within 30 days, or if they fail to timely retake required annual privacy training. If they fail to reapply for access, CBP archives the account in the mainframe system until it conducts its annual user authentication review. If the user no longer requires access to the system, CBP deletes the account and the SSN from the mainframe system. Section 3.0 Uses of the Information 3.1 Describe how and why the project uses the information. CBP technical support and customer service personnel use the data listed in Section 2 to provide technical support and other service-oriented activities throughout CBP s technology enterprise. This information allows technical support personnel to create and track numerical incident tickets that are used to (1) manage help desk requests, (2) technology maintenance incidents, (3) assign work orders, (4) manage IT assets, (5) test and evaluate new IT systems, and (6) customer service inquiries throughout the lifecycle of the activity. CBP uses to manage work order processing, maintenance, asset and property management, and overall IT enterprise management. CBP Employees & Contractors: Technical support personnel use employee and contractor information such as name, HashID, work location, device name/number, contact information, and incident ticket number (for existing incidents) in order to provide support for CBP IT systems, assets, and property. Other Individuals with Access to CBP Systems: CBP technical support personnel use the individual s information such as name, SSN (used to convert the SSN into a HashID for non-cbp persons), agency, business location, system or

9 Page 8 program requiring support, contact information, and incident ticket number (for existing incidents) to provide support to entities seeking access to CBP-owned law enforcement, trade, or travelrelated IT systems. Trusted Travelers: Technical support and customer service personnel use the individual s information such as name, trusted traveler number, home address, CBP program requiring support, contact information, and incident ticket number (for existing incidents). This information allows CBP to provide assistance to individuals seeking information on, or assistance with, trusted traveler programs. 3.2 Does the project use technology to conduct electronic searches, queries, or analyses in an electronic database to discover or locate a predictive pattern or an anomaly? If so, state how DHS plans to use such results. No. 3.3 Are there other components with assigned roles and responsibilities within the system? No. 3.4 Privacy Impact Analysis: Related to the Uses of Information Privacy Risk: There is a risk that -related PII could be used for purposes outside the scope of IT support or activities associated with other CBP programs. Mitigation: CBP uses distinct login-password procedures, including personal identity verification (PIV) smart cards to access various systems and/or databases. These safeguards render PII obtained during the IT support and customer service process unusable in other agency systems. The risk is further mitigated through role-based access rules governing technical support personnel usage. Privacy Risk: There is a risk of identity theft or harm to individuals due to the use of SSN to generate the HashID, in the event of a breach or unauthorized access to information within. Mitigation: This risk is partially mitigated by CBP s use of access controls within. This risk cannot be fully mitigated until CBP ends its reliance on SSN to generate HashIDs for CBP system access. The DHS Privacy Office recommends that CBP adopt a new, updated process for issuing user log-in credentials that does not rely on the SSN.

10 Page 9 Section 4.0 Notice 4.1 How does the project provide individuals notice prior to the collection of information? If notice is not provided, explain why not. CBP provides notice through general privacy policy statements on all public facing websites such as CBP s Customer Service (Contact Us) Internet Site, CBP Information Center (help.cbp.gov), and Global Online Enrollment System (GOES) web portals. This PIA also serves as notice of how CBP manages PII associated with IT support or customer service activities. 4.2 What opportunities are available for individuals to consent to uses, decline to provide information, or opt out of the project? Individuals have the right to withhold consent to provide information to address their IT or customer service matter, but doing so will prevent technical support and customer service personnel from addressing the individual s matter in an efficient and effective manner. 4.3 Privacy Impact Analysis: Related to Notice Privacy Risk: There is a risk that individuals who access CBP systems may not know exactly how CBP uses SSNs and HashIDs during the identity verification process or whether the agency retains that information within the system or other agency systems or databases. Mitigation: CBP mitigates this risk by notifying non-cbp persons and members of the public verbally about the reason for soliciting the individual s SSN, HashID, contact information, or trusted traveler number in order to provide appropriate support. CBP plans to further mitigate this risk by enhancing the privacy notices on CBP customer service websites by including Privacy Act statements per the Privacy Act. 14 See Appendix A U.S.C. 552(a)(e)(3); available at title5-parti-chap5-subchapii-sec552a.pdf.

11 Page 10 Section 5.0 Data Retention by the project 5.1 Explain how long and for what reason the information is retained. Per DAA-GRS (IT Operations and Maintenance Records) approved in September 2014, CBP will destroy IT operations and maintenance records 3 years after agreement, control measures, procedures, project, activity, or transaction is obsolete, completed, terminated, or superseded. Per N1-GRS-03-1 item 10a and 10b (IT Customer Service Files) approved in August 2015, CBP will destroy or delete the records after 1 year or when no longer needed for review and analysis. These schedules authorize longer retention if required for business use. 5.2 Privacy Impact Analysis: Related to Retention Privacy Risk: There is a risk that PII may be retained for longer than necessary to fulfill the specified purposes. Mitigation: This risk is mitigated by the retention schedules. CBP mitigates this risk by deleting IT customer service files after 1 year or when no longer needed for review and analysis pursuant to the NARA-approved retention schedules. The risk is further mitigated by security measures that render PII used for IT or customer service support unusable in other CBP systems that may require PIV cards for access purposes. CBP also mitigates this risk by deleting the SSN and associated HashID from its secure Mainframe system following an annual user authentication review that confirms whether or not the user requires access to CBP-owned IT systems. Section 6.0 Information Sharing 6.1 Is information shared outside of DHS as part of the normal agency operations? If so, identify the organization(s) and how the information is accessed and how it is to be used. CBP does not share information contained in outside of DHS. 6.2 Describe how the external sharing noted in 6.1 is compatible with the SORN noted in 1.2. CBP does not share information contained in outside of DHS. 6.3 Does the project place limitations on re-dissemination? CBP does not share PII contained in with external entities.

12 Page Describe how the project maintains a record of any disclosures outside of the Department. CBP does not share PII contained in with external entities. 6.5 Privacy Impact Analysis: Related to Information Sharing There is no privacy risk to information sharing. Section 7.0 Redress 7.1 What are the procedures that allow individuals to access their information? Although individuals submit the information maintained in voluntarily to request IT support, system access, or information on CBP-owned programs or initiatives, they may request information about their records or to seek corrections, pursuant to procedures provided by the Freedom of Information Act (FOIA) 15 and the access provisions of the Privacy Act of 1974, and by writing to: U.S. Customs and Border Protection (CBP) Freedom of Information Act (FOIA) Division 90 K Street, NE Washington, DC When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform to the Privacy Act regulations set forth in federal regulations regarding Domestic Security and Disclosure of Records and Information. 16 You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under federal statute regarding Unsworn Declarations Under Penalty of Perjury, 17 a law that permits statements to be made under penalty of perjury as a substitute for notarization. While your inquiry requires no specific form, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, or In addition, you should: Explain why you believe the Department would have information on you; 15 5 U.S.C CFR Part U.S.C. 1746; available at partv-chap115-sec1746.pdf.

13 Page 12 Identify which component(s) of the Department you believe may have the information about you; Specify when you believe the records would have been created; and Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records. If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records. Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations. Non-CBP-persons may access, review, and correct inaccurate information in their user profile or records contained in CBP-owned IT systems. Trusted traveler participants may access their GOES account to review and correct inaccurate information contained in their profile or in their records. 7.2 What procedures are in place to allow the subject individual to correct inaccurate or erroneous information? Individuals have an opportunity to correct his/her information at the time of collection by IT technical support and customer service personnel. They may also submit a Privacy Act request as described in Section How does the project notify individuals about the procedures for correcting their information? This PIA explains how an individual may correct his/her information once obtained by the system. In addition, CBP provides notice to individuals via the applicable SORNs in Section Privacy Impact Analysis: Related to Redress Privacy Risk: There is minimal risk that individuals may submit inaccurate information that might prolong or prevent technical or customer service support. Mitigation: The individual mitigates any risk by providing accurate information to allow IT support or customer service personnel to address their matter or concern. They also have the option of using the process in Section 7.1 to address matters pertaining to systems supported by.

14 Page 13 Section 8.0 Auditing and Accountability 8.1 How does the project ensure that the information is used in accordance with stated practices in this PIA? CBP deploys extensive security measures to protect all collected information from inappropriate use and/or disclosure through both access controls and CBP employee information security and privacy training. logs system access and OIT personnel conduct periodic compliance reviews of all users. 8.2 Describe what privacy training is provided to users either generally or specifically relevant to the project. All DHS employees and contractors receive annual privacy awareness training. CBP requires users to take separate role-based Security Awareness Training prior to granting access to the system. CBP OIT Account Management staff designate Master Administrators that manage role-base access. Individuals serviced through incident tickets do not receive access to the system. 8.3 What procedures are in place to determine which users may access the information and how does the project determine who has access? CBP OIT Account Management staff identifies and selects System Administrators that receive full access to the entire application. System Administrators may designate additional master administrators that maintain access to all of the application s administrative tools. Master Administrators may designate Developers and Administrators that maintain the right to create users based on an individual s IT or customer service support role, need to know, and completed background investigation. access control procedures adhere strictly to the DHS Sensitive Systems Policy Directive 4300A. employs an automated auditing tool that monitors account creation, modification, enabling, disabling, and removal actions and notifies System Administrators as needed. 8.4 How does the project review and approve information sharing agreements, MOUs, new uses of the information, new access to the system by organizations within DHS and outside? All information sharing and MOUs concerning PII sharing, including those related to, are created by the operational owner of the system and are sent to the CBP Privacy Officer and Office of Chief Counsel for review. Upon the review s completion, CBP sends the

16 Page 15 APPENDIX A Privacy Act Statement Authority: CBP collects this information pursuant to Pub.L , 8 CFR Part 235.1, and E.O (SSN), as amended by E.O Purpose: The information is used to provide support to individuals that request IT support, access to CBP-owned IT systems, or information on CBP programs or initiatives. Routine Uses: CBP may share this information in accordance with the Privacy Act, 5 U.S.C. 552(a) or pursuant to the Routine Uses in the System of Records Notices associated with the System: DHS/ALL-004, General Information Technology Access Account Records System of Records. Disclosure: Furnishing this information, including your Social Security number (SSN) or HashID, is voluntary. However, failure to provide the information may prevent CBP from verifying your identity in order to address your matter or concern. Your SSN will be used to convert the SSN into a HashID that you may use to access a CBP system or database. CBP may seek the SSN verbally to complete the conversion. CBP will store the SSN and HashID in a secure database until they are no longer needed to access CBP-owned IT systems.

for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program Carolyn.Dorgham@dhs.gov Reviewing Official Mary

for the Student Administration and Scheduling System DHS/FLETC/PIA-002 February 12, 2013 Contact Point William H. Dooley Chief, Office of IT Budget, Policy, & Plans (912) 261-4524 Reviewing Official Jonathan

for the Bonds Online System (ebonds) - Phase One July 14, 2009 Contact Point James T. Hayes, Jr. Director, Office of Detention and Removal U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing

for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy

FHFA Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a more

Privacy Impact Assessment for the Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) United States Marshals Service Contact Point William E. Bordley Associate

This document is scheduled to be published in the Federal Register on 07/14/2016 and available online at http://federalregister.gov/a/2016-16598, and on FDsys.gov 9110-04 DEPARTMENT OF HOMELAND SECURITY

For Personnel Development Program Data Collection System (DCS) Date: June 1, 2014 Point of Contact: Marlene Simon-Burroughs Marlene.Simon-Burroughs@ed.gov System Owner: Bonnie Jones Bonnie.Jones@ed.gov

Privacy Impact Assessment Form LITIGATION SUPPORT SYSTEM (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a

Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT

for the Five Country Joint Enrollment and Information-Sharing Project (FCC) November 2, 2009 Contact Point Paul Hasson, Privacy Officer Program National Protection & Programs Directorate (202) 298-5200

U.S. Securities and Exchange Commission (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) February 24, 2013 General Information 1. Name of Project or System. (MPTS) 2. Describe the project and its purpose or function

for the e-law Enforcement Officer Logbook Program August 31, 2009 Contact Point Ted Bradford Office of Law Enforcement Federal Air Marshal Service Liaison Division Edward.Bradford@dhs.gov Reviewing Officials

This document is scheduled to be published in the Federal Register on 01/27/2016 and available online at http://federalregister.gov/a/2016-01517, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

for the Integrated Digitization Document Management Program (IDDMP) DHS/USCIS/PIA-003(a) September 24, 2013 Contact Point Donald Hawkins Privacy Officer United States Citizenship and Immigration Services

for the Federal Protective Service Dispatch and Incident Record Management Systems September 16, 2009 Contact Point Gary Schenkel Director, Federal Protective Service U.S. Immigration and Customs Enforcement

U.S. Securities and Exchange Commission (IWMS) PRIVACY IMPACT ASSESSMENT (PIA) March 21, 2013 General Information 1. Name of Project or System. (IWMS) 2. Describe the project and its purpose or function